Stewart Kowalski

Orcid: 0000-0003-3601-8387

Affiliations:
  • Norwegian University for Science and Technology, Gjøvik, Norway
  • Royal Institute of Technology, Kista, Sweden (former)


According to our database1, Stewart Kowalski authored at least 57 papers between 1991 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Advancing the concept of cybersecurity as a public good.
Simul. Model. Pract. Theory, 2022

A Socio-Technical Regime Transitions Model for Gerontechnology Service Design: Privacy, Information Security and Cyber Security in Focus.
Proceedings of the pHealth 2022 - Proceedings of the 19th International Conference on Wearable Micro and Nano Technologies for Personalized Health, 2022

2021
A case study of a municipality phishing attack measures - towards a socio-technical incident management framework.
Proceedings of the 7th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2021), 2021

Consulting the Oracle at Delphi - Combining Risk I and Risk in cyber security.
Proceedings of the 7th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2021), 2021

Multi-paradigmatic approaches in cybersecurity economics.
Proceedings of the 7th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2021), 2021

2020
Towards a Maturity Improvement Process - Systemically Closing the Socio-Technical Gap.
Proceedings of the 6th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2020), 2020

Preparing for Cyber Crisis Management Exercises.
Proceedings of the Augmented Cognition. Human Cognition and Behavior, 2020

From Cyber Incidents to Training Cognitive Situation Management: *Work in Progress.
Proceedings of the IEEE Conference on Cognitive and Computational Aspects of Situation Management, 2020

2019
A Socio-technical Systems Approach to Design and Support Systems Thinking in Cybersecurity and Risk Management Education.
Complex Syst. Informatics Model. Q., 2019

Deriving Cyber Security Risks from Human and Organizational Factors - A Socio-technical Approach.
Complex Syst. Informatics Model. Q., 2019

Social Preferences in Decision Making Under Cybersecurity Risks and Uncertainties.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2019

Designing Serious Games for Cyber Ranges: A Socio-technical Approach.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

A Socio-Technical Framework to Improve Cyber Security Training: A Work in Progress.
Proceedings of the 5th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2019) co-located with 27th European Conference on Information Systems (ECIS 2019), 2019

Cassandra's Calling Card: Socio-technical Risk Analysis and Management in Cyber Security Systems.
Proceedings of the 5th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2019) co-located with 27th European Conference on Information Systems (ECIS 2019), 2019

Spiraling out in control: A Video Cartesian Dialectic on a Socio-technical Approach to Teaching Privacy, Information- and Cyber Security (PICS).
Proceedings of the 5th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2019) co-located with 27th European Conference on Information Systems (ECIS 2019), 2019

A Maturity Model for IT-Related Security Incident Management.
Proceedings of the Business Information Systems - 22nd International Conference, 2019

An empirical study of security culture in open source software communities.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

2018
A Pilot Study in Cyber Security Education Using CyberAIMs: A Simulation-Based Experiment.
Proceedings of the Information Security Education - Towards a Cybersecure Society, 2018

Using a Socio-technical Systems Approach to Design and Support Systems Thinking in Cyber Security Education.
Proceedings of the 4th International Workshop on Socio-Technical Perspective in IS development (STPIS'18) co-located with 30th International Conference on Advanced Information Systems Engineering (CAiSE 2018), 2018

Beyond Training and Awareness: From Security Culture to Security Risk Management.
Proceedings of the 4th International Workshop on Socio-Technical Perspective in IS development (STPIS'18) co-located with 30th International Conference on Advanced Information Systems Engineering (CAiSE 2018), 2018

2017
A Case Study: Heartbleed Vulnerability Management and Swedish Municipalities.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

I Am Ok, the Material's Not: A Transactional Analysis of Information Security Education Material for Swedish Elementary School Students.
Proceedings of the HCI International 2017 - Posters' Extended Abstracts, 2017

Summary of the Interactive Workshop Sessions at STPIS'16.
Proceedings of the 3rd International Workshop on Socio-Technical Perspective in IS development (STPIS'17) co-located with 29th International Conference on Advanced Information Systems Engineering (CAiSE 2017), 2017

2016
IT Security Incidents Escalation in the Swedish Financial Sector: A Maturity Model Study.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

A Framework and Prototype for A Socio-Technical Security Information and Event Management System (ST-SIEM).
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016

2015
Simulating apprenticeship using multimedia in higher education: A case from the information systems field.
Interact. Technol. Smart Educ., 2015

A Socio-technical Framework for Threat Modeling a Software Supply Chain.
IEEE Secur. Priv., 2015

Teaching Enterprise Modeling Based on Multi-media Simulation: A Pragmatic Approach.
Proceedings of the E-Technologies - 6th International Conference, 2015

Facebook as a Learning Tool in Formal Learning Process.
Proceedings of the HCI International 2015 - Posters' Extended Abstracts, 2015

Reuse of Simulated Cases in Teaching Enterprise Modelling.
Proceedings of the Advances in Conceptual Modeling, 2015

HIPing Innovation Education in University. Introducing Socio-Technical Concepts for Cross-Disciplinary Teams in Applied Computer Sciences.
Proceedings of the 1st International Workshop on Socio-Technical Perspective in IS Development (STPIS'15) co-located with the 27th International Conference on Advanced Information Systems Engineering (CAiSE 2015), 2015

2014
The Impact of Business-IT Alignment on Information Security Process.
Proceedings of the HCI in Business - First International Conference, 2014

HIP - A Technology-Rich and Interactive Multimedia Pedagogical Platform.
Proceedings of the Learning and Collaboration Technologies. Designing and Developing Novel Learning Experiences, 2014

A Framework for Synchronizing Human Behavior, Processes and Support Systems Using a Socio-technical Approach.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2014

Generating features for named entity recognition by learning prototypes in semantic space: The case of de-identifying health records.
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Biomedicine, 2014

2013
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
Int. J. E Entrepreneurship Innov., 2013

Evaluating a Framework for Securing E-Government Services - A Case of Tanzania.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

2012
Secure e-Government Services: A Comparative Analysis of e-Government Maturity Models for the Developing Regions-The Need for Security Services.
Int. J. Electron. Gov. Res., 2012

ST(CS)<sup>2</sup> - Featuring socio-technical cyber security warning systems.
Proceedings of the 2012 International Conference on Cyber Security, 2012

2011
Secure e-Government Services: Towards A Framework for Integrating IT Security Services into e-Government Maturity Models.
Proceedings of the Information Security South Africa Conference 2011, 2011

Towards An Information Security Maturity Model for Secure e-Government Services: A Stakeholders View.
Proceedings of the 5th International Symposium on Human Aspects of Information Security and Assurance, 2011

Cyber Security Alert Warning System: A Socio-techinal Coordinate System Proposal.
Proceedings of the Third International Workshop on Security Measurements and Metrics, 2011

2010
Group Dynamics in a Security Risk Management Team Context: A Teaching Case Study.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

2009
Methodology for Considering Environments and Culture in Developing Information Security Systems.
Proceedings of the Information Security South Africa Conference 2009, 2009

Two Case Studies in Using Chatbots for Security Training.
Proceedings of the Information Assurance and Security Education and Training, 2009

Secure e-learning using a holistic and immune security framework.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Towards Automating Social Engineering Using Social Networking Sites.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
The cycle of deception - a model of social engineering attacks, defenses and victims.
Proceedings of the 2nd International Conference on Human Aspects of Information Security and Assurance, 2008

2007
Bridging the gap between general management and technicians - A case study on ICT security in a developing country.
Comput. Secur., 2007

2006
A Social-Technical View of ICT Security Issues, Trends, and Challenges: Towards a Culture of ICT Security - The Case of Tanzania.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006

2005
An approach to enhance the security of ICT infrastructure through legal, regulatory influences.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005

A Framework for Evaluation of Information Systems Security.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005

1993
Historical Labels in Open Distributed Systems: An ITSEC/ECMA Specification.
Proceedings of the Computer Security, 1993

The SBC Model as a Conceptual Framework for Reporting IT Crimes.
Proceedings of the Security and Control of Information Technology in Society, 1993

1991
Cybernetic analysis of the 12th U.S. National Computer Security Conference.
Comput. Secur., 1991

Cybernetic analysis of national computer security.
Comput. Secur., 1991

The ABCs and Es of national computer security policies.
Comput. Secur., 1991


  Loading...